
48 min
Advanced interconnect attacks
Chasing GRX and SS7 vulns

46 min
Bugged Files
Is Your Document Telling on You?

28 min
Hardware attacks: hacking chips on the (very) cheap
How to retrieve secret keys without going bankrupt

56 min
Helping the Helpless
Targeted threats to civil society

58 min
How to Destroy a Laptop with Top Secrets
How did GCHQ do it to the Guardian's copy of Snowden's…

55 min
How to make your software build reproducibly
Get a verifiable path from source to binary

29 min
Jumping the Paywall
How to freely share research without being arrested

42 min
Let's Encrypt
A Certificate Authority To Encrypt the Entire Web

30 min
Privacy Badger
Stop being tracked online

52 min
TLS interception considered harmful
How Man-in-the-Middle filtering solutions harm the security…

31 min